- The Cybersecurity Digest Newsletter
- Posts
- Mid Week Cybersecurity Digest: 4 Sep 2024
Mid Week Cybersecurity Digest: 4 Sep 2024
Yubico Keys Cloned, VMWare Fusion Patch, and Updates about a Fake GlobalProtect pushing malware
The Cybersecurity Digest Newsletter
Date: 4 Sept 2024
Happy Wednesday everyone! I hope that you all like the new format of the newsletter!
Today there are quite a few updates to go through. Some things I definitely recommend reading more into is the Yubico vulnerability, Unit42’s update about the Spoofed GlobalProtect being pushed, and the Manitcora Loader which is a new malware-as-a-service. There have been a lot of patches pushed so far this week. As always check out the patches and CISA advisories and see if you are impacted!
**Please note that Blue Article Titles and gray boxes link directly to other articles or sources used. Additionally, if the background is too dark for text on mobile, try turning off your phones dark mode.
Upcoming In Today's Issue
Notable News
Image generated with DALL-E
Readworthy Research
Image generated with DALL-E
Prevalent Patches
Image generated by DALL-E
CISA Corner
Image generated by DALL-E
CISA KEV Additions
CVE-2021-20123 Draytek VigorConnect Path Traversal Vulnerability
A local file inclusion vulnerability exists in Draytek VigorConnect 1.6.0-B3 in the file download functionality of the DownloadFileServlet endpoint. An unauthenticated attacker could leverage this vulnerability to download arbitrary files from the underlying operating system with root privileges.
CVE-2021-20124 Draytek VigorConnect Path Traversal Vulnerability
A local file inclusion vulnerability exists in Draytek VigorConnect 1.6.0-B3 in the file download functionality of the WebServlet endpoint. An unauthenticated attacker could leverage this vulnerability to download arbitrary files from the underlying operating system with root privileges.
CVE-2024-7262 Kingsoft WPS Office Path Traversal Vulnerability
Improper path validation in promecefpluginhost.exe in Kingsoft WPS Office version ranging from 12.2.0.13110 to 12.2.0.16412 (exclusive) on Windows allows an attacker to load an arbitrary Windows library. The vulnerability was found weaponized as a single-click exploit in the form of a deceptive spreadsheet document
CISA ICS Advisory
Conclusion:
Thank you for reading this edition of the Cybersecurity Digest Newsletter. If you enjoyed this newsletter, please share with someone you know who would benefit from this information.
Have a good rest of your week!
Until next time, Stay Secure!
Reply